Skip to main content

HackerOne Blog

Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.

HackerOne - Blog Header Image
Security Compliance

Cyber Regulations Can Make Our Nation Safer

While a largely voluntary approach to critical infrastructure cybersecurity has led to some improvements, a general lack of mandatory requirements has...

HackerOne - Blog Header Image
Security Compliance

Cyber Regulations Can Make Our Nation Safer

While a largely voluntary approach to critical infrastructure cybersecurity has led to some improvements, a...
HackerOne Blog Image
Vulnerability Management

HackerOne Assets Deep Dive: Asset Inventory

What is Asset Inventory? The effectiveness of an ASM initiative is determined by how well the solution records...
Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve
Vulnerability Management

Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve

Hacker Engagement First impressions matter! Win hackers over early on and create “anchor” hackers - program...
HackerOne Blog - Main Image 24
Vulnerability Management

Level Up Your Bug Bounty Effectiveness: 3 Keys to Launch a Successful Program

With this two-part blog series, we will delve into strategies and tactics exhibited by dozens of enterprise...
HackerOne Blog - Main Blog Image 23
Ethical Hacker

What Does Belgium’s New Legal Framework On Hacking Mean For Me?

The Belgian government has recently announced a new Belgian law that will allow ethical hackers to hack any...
Ian Carroll, Staff Security Engineer @ Robinhood
Customer Stories, Bounty, Application Security, Best Practices

Robinhood Goes Long on Bug Bounty: Q&A with Ian Carroll and @ashwarya

Seven years of bug bounty, 21-hour average time to bounty, 130 hackers thanked, and hackers on both sides of...

HackerOne Blog - Blog Graphic 45
Vulnerability Management

Outsmart Cybercriminals with Proactive Attack Surface Management (ASM)

Why is ASM Important? Your attack surface is the sum of all entry points an attacker could use to access your...
HackerOne Blog
Vulnerability Management

Beyond a VDP: How a Challenge Brings Proactive Security to Your Agency

Vulnerability Disclosure Programs create an effective means for researchers and other users to report...